Scroll to top
Security for Charitable Foundations and Philanthropic Operations | CloseProtectionHire

Security Intelligence

Security for Charitable Foundations and Philanthropic Operations | CloseProtectionHire

HNWI philanthropists and foundation directors face distinct security risks from public grant announcements to overseas charitable operations. James Whitfield explains the baseline.

8 min 7 May 2026

Written by James Whitfield — Senior Security Consultant

Philanthropic foundations run by HNWI principals occupy an unusual space in security planning. The principal’s charitable activities are often more public than their business activities. The combination of high visibility, overseas operational presence, and frequent public events creates a security profile that many foundations have not formally addressed.

James Whitfield, Senior Security Consultant, has advised foundation trustees and their principals on this specific intersection. The starting point, he notes, is recognising that charitable intent does not reduce the threat environment.

Grant announcements and visibility management

A large public grant announcement creates a defined moment of visibility for the principal. A GBP 10m commitment to an educational foundation, announced at a charity dinner with press coverage and social media amplification, identifies the principal as an HNWI with accessible capital in a way that private business activity does not.

In lower-risk environments, this visibility creates a manageable but real increase in social engineering, scam, and physical approach risk. In cities with elevated kidnap-for-ransom risk, it feeds targeting intelligence. OSAC annual reports for Nigeria, Kenya, Colombia, and the Philippines all document the use of public records, press coverage, and social media to identify kidnap targets from among high-net-worth individuals.

The mitigation is not silence: transparency obligations apply to registered charities under Charity Commission guidance CC15d, and major donors frequently have reputational reasons to be publicly associated with their giving. The mitigation is timing awareness and visibility management: reviewing whether a specific announcement creates disproportionate peak exposure, whether the principal’s identity can be associated with a foundation name rather than their personal name without undermining the charitable purpose, and whether the principal’s own public profile in the period following a major announcement warrants additional precautions.

Charity galas, awards events, and public fundraising dinners introduce a specific risk: publicly ticketed events with unknown guests. At a private dinner with fifty known guests, the security baseline is straightforward. At a charity ball with four hundred ticket purchasers, the guest list includes individuals who have not been vetted. At high-value events where an HNWI principal is identifiable as the lead donor and will be visible for several hours, advance guest list review, venue access control, and consideration of the principal’s exposure within the venue are appropriate.

Overseas operations: the staff security dimension

Foundations with programme operations in high-risk countries carry a duty of care to their staff that mirrors the obligations of any employer. The Health and Safety at Work Act 1974, the Management of Health and Safety at Work Regulations 1999, and the duty of care principles in ISO 31030:2021 apply to charity staff on overseas programme visits in the same way they apply to corporate staff.

The Charity Commission’s trustee guidance requires risk assessment for overseas operations as part of the trustee risk register. That assessment must include physical security risk in the relevant operating environment. A foundation operating in northern Nigeria, South Sudan, or eastern DRC without a documented security assessment is in breach of trustee duties, not just good practice.

Staff working in programme locations in P1 cities and conflict-affected environments need pre-travel security briefing, communications protocols, check-in schedules, and emergency response support. They are not protected by diplomatic status and may not have travel insurance that covers their specific operating environment. Foundation trustees should verify that the foundation’s travel insurance policy covers all programme-related travel, including in elevated-risk countries.

In-country partner organisations carry their own security risks for visiting foundation staff. A due diligence process for overseas partners should include assessment of the partner’s security arrangements: whether they have a security management plan, whether their staff receive security training, and whether their office and field locations have been assessed against the risks specific to their operating area.

See the related guidance on security for NGO and humanitarian workers for the detailed security framework that applies to programme staff in high-risk environments.

Donor and beneficiary data protection

Charitable foundations hold two categories of sensitive data: donor data and beneficiary data.

Donor data includes names, contact details, donation amounts, and potentially information about donors’ financial circumstances, tax arrangements, and personal motivations. This is personal data under UK GDPR and the Data Protection Act 2018. For foundation donors who are private individuals, it is personal data with significant sensitivity: a leaked donor list reveals both the individuals’ charitable associations and, potentially, the scale of their financial capacity.

Beneficiary data is often more sensitive still. Foundations working with children, vulnerable adults, refugees, or individuals affected by health conditions hold data that qualifies as special category data under UK GDPR Article 9: health data, religious beliefs, political opinions, racial or ethnic origin. Processing this data requires explicit consent, a legal basis under Article 9(2), and enhanced security measures proportionate to the sensitivity.

The ICO’s guidance on data protection for charities sets out the requirements. Key practical measures: access controls that limit beneficiary data to staff with a direct programme need, encryption for data at rest and in transit, a clear retention and deletion policy, and a data breach response procedure that meets the 72-hour notification requirement to the ICO.

A compromised beneficiary database is not just a regulatory event: it directly harms real people, potentially exposing their health status, their displacement circumstances, or their involvement in politically sensitive activities to audiences who could use that information against them.

The principal’s personal security exposure

Foundation activities create visibility that feeds into the principal’s overall threat assessment. A HNWI who makes major public donations, chairs a foundation board, attends high-profile charity galas, and visits overseas programme operations in high-risk countries has a larger public footprint than one whose philanthropy is entirely private.

This is not an argument against public philanthropy. It is an argument for integrating the foundation’s activities into the principal’s overall security programme. The private client security programme should account for the visibility created by charitable activities, the travel generated by overseas programme visits, and the events where the principal is publicly present in a context where the guest list is not fully controlled.

For foundations chaired or led by individuals who already have a close protection programme, the foundation’s activities should be briefed to the security team as a standard part of event and travel planning. Charity event schedules, overseas programme visits, and major public announcements should be included in the security team’s advance work cycle alongside business travel and private events.

See the guidance on security for family offices for the broader private client security framework within which foundation activities typically sit.

Trustee and adviser security

Foundation trustees, legal advisers, and accountants with access to foundation records and the principal’s charitable giving history hold sensitive information. The risk of that information being accessed or disclosed is an insider threat question, not uniquely a charity question, but the charitable context adds specific dimensions.

Large donations to politically associated causes, religious institutions, or overseas organisations may have political or reputational sensitivity beyond their charitable purpose. A leaked record of a principal’s charitable giving history could be used for reputational damage, political pressure, or targeted social engineering.

Trustee meeting minutes, grant records, and beneficiary files should be stored on encrypted platforms with role-based access controls. External advisers should access foundation records only through secure channels and only for the purpose for which access was granted.


Sources: Charity Commission CC29 Safeguarding Guidance 2024; Charity Commission CC15d Reporting Requirements 2024; ICO Data Protection Guidance for Charities 2024; UK GDPR and Data Protection Act 2018; Health and Safety at Work Act 1974; Management of Health and Safety at Work Regulations 1999; ISO 31030:2021 Travel Risk Management; OSAC Nigeria, Kenya, Colombia, Philippines 2024; FCDO Travel Advice April 2026.

Summary

Key takeaways

1
1
Grant announcements require a security review

Before any high-profile public announcement of a major donation, assess whether the announcement creates disproportionate visibility for the principal. Phased or aggregated reporting may reduce peak exposure without compromising transparency obligations.

2
2
Charity gala events carry unknown guest risk

Publicly ticketed charity galas introduce a guest list that includes unknown individuals. Ticket purchasers are not vetted in the same way as private event guests. At high-value events involving HNWI principals, advance guest list review and venue access control are appropriate.

3
3
Overseas operations require a country-level security assessment

Charity Commission trustee guidance requires risk assessment for overseas operations. That assessment must include physical security risk for staff and the principal when visiting.

4
4
Beneficiary data is among the most sensitive data a charity holds

Data on vulnerable adults and children held in connection with charitable programmes is special category data under UK GDPR. Its compromise causes direct harm to real people. Treat it with the same security rigour as the foundation's financial data.

5
5
The foundation's staff in-country face the same risks as any other professional in that environment

Foundation staff visiting programme operations in Nigeria, Kenya, Colombia, or the Philippines face the same physical risk environment as any corporate traveller. They do not benefit from diplomatic protection and may not have corporate travel insurance that covers high-risk locations.

FAQ

Frequently Asked Questions

Three reasons. First, high-profile charitable activity creates public visibility for the principal, which increases targeting risk. A headline grant announcement identifies the donor as a HNWI in a way that routine business activity does not. Second, overseas charitable operations often take place in high-risk countries where the foundation’s staff and the principal’s advisers face physical risk. Third, the foundation itself holds sensitive personal data on beneficiaries, staff, and donors that requires protection under UK GDPR and the Data Protection Act 2018.

The Charity Commission’s CC29 guidance on safeguarding requires charities working with vulnerable adults and children to conduct DBS checks and maintain safeguarding policies. The Commission’s due diligence guidance also requires trustees to assess risks in overseas operations, which includes physical security risk in high-risk countries. Foundations with overseas operations in conflict-affected or elevated-risk environments should document their security assessment as part of their trustee risk register.

A large public grant announcement identifies the donor as an HNWI with accessible capital. Press releases, social media coverage, and charity gala events create a visibility spike. In cities with elevated kidnap for ransom risk, this visibility feeds targeting intelligence. For foundations making regular large public donations, this is a sustained risk, not a single event.

Through a structured due diligence process: legal registration status in the relevant country, financial statements, reference checks with other international funders, on-the-ground visit by a foundation representative, and assessment of the partner’s own security arrangements for its staff. In high-risk countries, the partner organisation’s relationship with local authorities and armed groups is a specific due diligence question, not a peripheral one.

UK GDPR and the Data Protection Act 2018 apply to any personal data held by a UK-registered charity. Donor names, contact details, and financial data are personal data. Donor health information, religious affiliation, or political views, which may be relevant to some charitable purposes, are special category data under UK GDPR Article 9 and require explicit consent and enhanced protections. The ICO’s guidance on data protection for charities sets out the requirements.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.